Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 110
Filtrar
Mais filtros

Tipo de documento
Intervalo de ano de publicação
1.
Sensors (Basel) ; 24(7)2024 Mar 22.
Artigo em Inglês | MEDLINE | ID: mdl-38610235

RESUMO

In a LoRaWAN network, the backend is generally distributed as Software as a Service (SaaS) based on container technology, and recently, a containerized version of the LoRaWAN node stack is also available. Exploiting the disaggregation of LoRaWAN components, this paper focuses on the emulation of complex end-to-end architecture and infrastructures for smart city scenarios, leveraging on lightweight virtualization technology. The fundamental metrics to gain insights and evaluate the scaling complexity of the emulated scenario are defined. Then, the methodology is applied to use cases taken from a real LoRaWAN application in a smart city with hundreds of nodes. As a result, the proposed approach based on containers allows for the following: (i) deployments of functionalities on diverse distributed hosts; (ii) the use of the very same SW running on real nodes; (iii) the simple configuration and management of the emulation process; (iv) affordable costs. Both premise and cloud servers are considered as emulation platforms to evaluate the resource request and emulation cost of the proposed approach. For instance, emulating one hour of an entire LoRaWAN network with hundreds of nodes requires very affordable hardware that, if realized with a cloud-based computing platform, may cost less than USD 1.

2.
Sensors (Basel) ; 24(14)2024 Jul 12.
Artigo em Inglês | MEDLINE | ID: mdl-39065909

RESUMO

This research proposes advanced model-based control strategies for a countercurrent flow plate heat exchanger in a virtual environment. A virtual environment with visual and auditory effects is designed, which requires a mathematical model describing the real dynamics of the process; this allows parallel fluid movement in different directions with hot and cold temperatures at the outlet, incorporating control monitoring interfaces as communication links between the virtual heat exchanger and control applications. A multivariable and non-linear process like the plate and countercurrent flow heat exchanger requires analysis in the controller design; therefore, this work proposes and compares two control strategies to identify the best-performing one. The first controller is based on the inverse model of the plant, with linear algebra techniques and numerical methods; the second controller is a model predictive control (MPC), which presents optimal control actions that minimize the steady-state errors and aggressive variations in the actuators, respecting the temperature constraints and the operating limits, incorporating a predictive model of the plant. The controllers are tested for different setpoint changes and disturbances, determining that they are not overshot and that the MPC controller has the shortest settling time and lowest steady-state error.

3.
Sensors (Basel) ; 24(2)2024 Jan 18.
Artigo em Inglês | MEDLINE | ID: mdl-38257707

RESUMO

Focusing on the problem of strip shape quality control in the finishing process of hot rolling, a shape model based on metal flow and stress release with the application of varying contact rolling parameters is introduced. Combined with digital twin technology, the digital twin framework of the shape model is proposed, which realizes the deep integration between physical time-space and virtual time-space. With the utilization of the historical data, the parameters are optimized iteratively to complete the digital twin of the shape model. According to the schedule, the raw material information is taken as the input to obtain the simulation of the strip shape, which shows a variety of export shape conditions. The prediction absolute error of the crown and flatness are less than 5 µm and 5 I-unit, respectively. The results prove that the proposed shape simulation model with strong prediction performance can be effectively applied to hot rolling production. In addition, the proposed model provides operators with a reference for the parameter settings for actual production and promotes the intelligent application of a shape control strategy.

4.
Sensors (Basel) ; 24(7)2024 Mar 29.
Artigo em Inglês | MEDLINE | ID: mdl-38610401

RESUMO

In recent years, headphones have become increasingly popular worldwide. There are numerous models on the market today, varying in technical characteristics and offering different listening experiences. This article presents an application for simulating the sound response of specific headphone models by physically wearing others. In the future, for example, this application could help to guide people who already own a pair of headphones during the decision-making process of purchasing a new headphone model. However, the potential fields of application are much broader. An in-depth study of digital signal processing was carried out with the implementation of a computational model. Prior to this, an analysis was performed on impulse response measurements of specific headphones, which allowed for a better understanding of the behavior of each set of headphones. Finally, an evaluation of the entire system was conducted through a listening test. The analysis of the results showed that the software works reasonably well in replicating the target headphones. We hope that this work will stimulate further efforts in the same direction.

5.
Sensors (Basel) ; 24(14)2024 Jul 17.
Artigo em Inglês | MEDLINE | ID: mdl-39066047

RESUMO

GPUs are commonly used to accelerate the execution of applications in domains such as deep learning. Deep learning applications are applied to an increasing variety of scenarios, with edge computing being one of them. However, edge devices present severe computing power and energy limitations. In this context, the use of remote GPU virtualization solutions is an efficient way to address these concerns. Nevertheless, the limited network bandwidth might be an issue. This limitation can be alleviated by leveraging on-the-fly compression within the communication layer of remote GPU virtualization solutions. In this way, data exchanged with the remote GPU is transparently compressed before being transmitted, thus increasing network bandwidth in practice. In this paper, we present the implementation of a parallel compression pipeline designed to be used within remote GPU virtualization solutions. A thorough performance analysis shows that network bandwidth can be increased by a factor of up to 2×.

6.
Adv Exp Med Biol ; 1406: 171-186, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37016115

RESUMO

In the post-pandemic era, one of the significant challenges for anatomy teachers is to reciprocate the experience of practical exposure while teaching the subject to undergraduates. These challenges span from conducting cadaveric dissections to handling real human bones, museum specimens, and tissue sections in the histology lab. Such exposures help the instructors to develop interactive communication with their fellow students and thus help to enhance communication skills among them. Recently, anatomy teachers all over the world started using cutting-edge educational technologies to make teaching-learning experiences for students more engaging, interesting, and interactive. Utilizing such cutting-edge educational technologies was an "option" prior to the pandemic, but the pandemic has significantly altered the situation. What was previously an "option" is now a "compulsion." Despite the fact that the majority of medical schools have resumed their regular on-campus classes, body donation and the availability of cadavers remain extremely limited, resulting in a deadlock. Anatomy teachers must incorporate cutting-edge educational technologies into their teaching and learning activities to make the subject more visual. In this chapter, we have attempted to discuss various new technologies which can provide a near-realistic perception of anatomical structures as a complementary tool for dissection/cadaver, various visualization techniques currently available and explore their importance as a pedagogic alternative in learning anatomy. We also discussed the recent advancement in visualization techniques and the pros and cons of technology-based visualization. This chapter identifies the limitations of technology-based visualization as a supplement and discusses effective utilization as an adjunct to the conventional pedagogical approaches to undergraduate anatomy education.


Assuntos
Educação de Graduação em Medicina , Estudantes de Medicina , Humanos , Currículo , Educação de Graduação em Medicina/métodos , Aprendizagem , Dissecação/educação , Cadáver
7.
Sensors (Basel) ; 23(11)2023 Jun 01.
Artigo em Inglês | MEDLINE | ID: mdl-37299985

RESUMO

In audio transduction applications, virtualization can be defined as the task of digitally altering the acoustic behavior of an audio sensor or actuator with the aim of mimicking that of a target transducer. Recently, a digital signal preprocessing method for the virtualization of loudspeakers based on inverse equivalent circuit modeling has been proposed. The method applies Leuciuc's inversion theorem to obtain the inverse circuital model of the physical actuator, which is then exploited to impose a target behavior through the so called Direct-Inverse-Direct Chain. The inverse model is designed by properly augmenting the direct model with a theoretical two-port circuit element called nullor. Drawing on this promising results, in this manuscript, we aim at describing the virtualization task in a broader sense, including both actuator and sensor virtualizations. We provide ready-to-use schemes and block diagrams which apply to all the possible combinations of input and output variables. We then analyze and formalize different versions of the Direct-Inverse-Direct Chain describing how the method changes when applied to sensors and actuators. Finally, we provide examples of applications considering the virtualization of a capacitive microphone and a nonlinear compression driver.


Assuntos
Acústica , Transdutores , Desenho de Equipamento
8.
Sensors (Basel) ; 23(5)2023 Mar 01.
Artigo em Inglês | MEDLINE | ID: mdl-36904890

RESUMO

The growing number of cyber-crimes is affecting all industries worldwide, as there is no business or industry that has maximum protection in this domain. This problem can produce minimal damage if an organization has information security audits periodically. The process of an audit includes several steps, such as penetration testing, vulnerability scans, and network assessments. After the audit is conducted, a report that contains the vulnerabilities is generated to help the organization to understand the current situation from this perspective. Risk exposure should be as low as possible because in cases of an attack, the entire business is damaged. In this article, we present the process of an in-depth security audit on a distributed firewall, with different approaches for the best results. The research of our distributed firewall involves the detection and remediation of system vulnerabilities by various means. In our research, we aim to solve the weaknesses that have not been solved to date. The feedback of our study is revealed with the help of a risk report in the scope of providing a top-level view of the security of a distributed firewall. To provide a high security level for the distributed firewall, we will address the security flaws uncovered in firewalls as part of our research.

9.
Sensors (Basel) ; 23(3)2023 Jan 29.
Artigo em Inglês | MEDLINE | ID: mdl-36772524

RESUMO

To maximize the performance of IoT devices in edge computing, an adaptive polling technique that efficiently and accurately searches for the workload-optimized polling interval is required. In this paper, we propose NetAP-ML, which utilizes a machine learning technique to shrink the search space for finding an optimal polling interval. NetAP-ML is able to minimize the performance degradation in the search process and find a more accurate polling interval with the random forest regression algorithm. We implement and evaluate NetAP-ML in a Linux system. Our experimental setup consists of a various number of virtual machines (2-4) and threads (1-5). We demonstrate that NetAP-ML provides up to 23% higher bandwidth than the state-of-the-art technique.

10.
Sensors (Basel) ; 23(11)2023 May 27.
Artigo em Inglês | MEDLINE | ID: mdl-37299838

RESUMO

The 5G network is designed to serve three main use cases: enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and ultra-reliable and low-latency communications (uRLLC). There are many new technological enablers, including the cloud radio access network (C-RAN) and network slicing, that can support 5G and meet its requirements. The C-RAN combines both network virtualization and based band unit (BBU) centralization. Using the network slicing concept, the C-RAN BBU pool can be virtually sliced into three different slices. 5G slices require a number of Quality of service (QoS) metrics, such as average response time and resource utilization. In order to enhance the C-RAN BBUs utilization while protecting the minimum QoS of the coexisting three slices, a priority-based resource allocation with queuing model is proposed. The uRLLC is given the highest priority, while eMBB has a higher priority than mMTC services. The proposed model allows the eMBB and mMTC to be queued and the interrupted mMTC to be restored in its queue to increase its chance to reattempt the service later. The proposed model's performance measures are defined and derived using a continuous-time Markov chain (CTMC) model and evaluated and compared using different methodologies. Based on the results, the proposed scheme can increase C-RAN resource utilization without degrading the QoS of the highest-priority uRLLC slice. Additionally, it can reduce the forced termination priority of the interrupted mMTC slice by allowing it to re-join its queue. Therefore, the comparison of the results shows that the proposed scheme outperforms the other states of the art in terms of improving the C-RAN utilization and enhancing the QoS of eMBB and mMTC slices without degrading the QoS of the highest priority use case.


Assuntos
Conscientização , Comunicação , Benchmarking , Cadeias de Markov , Alocação de Recursos
11.
Sensors (Basel) ; 23(10)2023 May 12.
Artigo em Inglês | MEDLINE | ID: mdl-37430613

RESUMO

Virtualization is a core 5G network technology which helps telecom companies significantly reduce capital expenditure and operating expenses by deploying multiple services on the same hardware infrastructure. However, providing QoS-guaranteed services for multi-tenants poses a significant challenge due to multi-tenant service diversity. Network slicing has been proposed as a means of addressing this problem by isolating computing and communication resources for the different tenants of different services. However, optimizing the allocation of the network and computation resources across multiple network slices is a critical but extremely difficult problem. Accordingly, this study proposes two heuristic algorithms, namely Minimum Cost Resource Allocation (MCRA) and Fast Latency Decrease Resource Allocation (FLDRA), to perform dynamic path routing and resource allocation for multi-tenant network slices in a two-tier architecture. The simulation results show that both algorithms significantly outperform the Upper-tier First with Latency-bounded Overprovisioning Prevention (UFLOP) algorithm proposed in previous work. Furthermore, the MCRA algorithm achieves a higher resource utilization than the FLDRA algorithm.

12.
Sensors (Basel) ; 23(11)2023 Jun 05.
Artigo em Inglês | MEDLINE | ID: mdl-37300067

RESUMO

Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. Moreover, NFV plays a crucial role in sensor and IoT networks by ensuring optimal resource usage and effective network management. However, adopting NFV in these networks also brings security challenges that must promptly and effectively address. This survey paper focuses on exploring the security challenges associated with NFV. It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. The research evaluates the strengths and weaknesses of various machine learning-based algorithms for detecting network-based anomalies in NFV networks. By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems.


Assuntos
Algoritmos , Aprendizado de Máquina , Resolução de Problemas , Tecnologia
13.
Sensors (Basel) ; 23(6)2023 Mar 12.
Artigo em Inglês | MEDLINE | ID: mdl-36991766

RESUMO

With the advent of Software Defined Network (SDN) and Network Functions Virtualization (NFV), network operators can offer Service Function Chain (SFC) flexibly to accommodate the diverse network function (NF) requirements of their users. However, deploying SFCs efficiently on the underlying network in response to dynamic SFC requests poses significant challenges and complexities. This paper proposes a dynamic SFC deployment and readjustment method based on deep Q network (DQN) and M Shortest Path Algorithm (MQDR) to address this problem. We develop a model of the dynamic deployment and readjustment of the SFC problem on the basis of the NFV/SFC network to maximize the request acceptance rate. We transform the problem into a Markov Decision Process (MDP) and further apply Reinforcement Learning (RL) to achieve this goal. In our proposed method (MQDR), we employ two agents that dynamically deploy and readjust SFCs collaboratively to enhance the service request acceptance rate. We reduce the action space for dynamic deployment by applying the M Shortest Path Algorithm (MSPA) and decrease the action space for readjustment from two dimensions to one. By reducing the action space, we decrease the training difficulty and improve the actual training effect of our proposed algorithm. The simulation experiments show that MDQR improves the request acceptance rate by approximately 25% compared with the original DQN algorithm and 9.3% compared with the Load Balancing Shortest Path (LBSP) algorithm.

14.
BMC Bioinformatics ; 23(1): 112, 2022 Mar 31.
Artigo em Inglês | MEDLINE | ID: mdl-35361130

RESUMO

BACKGROUND: Delivering tools for genome analysis to users is often difficult given the complex dependencies and conflicts of such tools. Container virtualization systems (such as Singularity) isolate environments, thereby helping developers package tools. However, these systems lack mutual composability, i.e., an easy way to integrate multiple tools in different containers and/or on the host. Another issue is that one may be unable to use a single container system of the same version at all the sites being used, thus discouraging the use of container systems. RESULTS: We developed LPMX, an open-source pure rootless composable container system that provides composability; i.e., the system allows users to easily integrate tools from different containers or even from the host. LPMX accelerates science by letting researchers compose existing containers and containerize tools/pipelines that are difficult to package/containerize using Conda or Singularity, thereby saving researchers' precious time. The technique used in LPMX allows LPMX to run purely in userspace without root privileges even during installation, thus ensuring that we can use LPMX at any Linux clusters with major distributions. The lowest overhead for launching containers with LPMX gives us courage to isolate tools as much as possible into small containers, thereby minimizing the chance of conflicts. The support for the layered file system keeps the total size of container images for a single genomic pipeline modest, as opposed to Singularity, which uses mostly a flat single-layer image. CONCLUSIONS: LPMX is pure rootless container engine with mutual composability, thus saving researchers' time, and accelerating science.

15.
J Med Internet Res ; 24(11): e37797, 2022 11 10.
Artigo em Inglês | MEDLINE | ID: mdl-36201851

RESUMO

BACKGROUND: This paper describes and discusses the transition of and modifications to a weight management randomized controlled trial among active-duty military personnel from an in-person to a virtual format as a result of the COVID-19 pandemic. The original pragmatic cohort-randomized controlled trial was designed to compare the effectiveness of an 8-week group weight management program, ShipShape, to a version of ShipShape enhanced with acceptance and commitment therapy. OBJECTIVE: The objective of our study was to assess potential differences between in-person and virtual participation in participants' demographics, motivation, confidence, credibility, expectations, and satisfaction with the interventions; we also examined the pragmatics of the technology and participants' experiences in virtual-format intervention groups. METHODS: A total of 178 active-duty personnel who had failed or were at risk of failing their physical fitness assessment or were overweight or obese were enrolled in the study. In-person (n=149) and virtual (n=29) participants reported demographics, motivation, confidence, credibility, expectations, and satisfaction. Interventionists recorded attendance and participation in the group sessions. Independent-sample 2-tailed t tests and chi-square tests were used to compare the characteristics of the in-person and virtual participants. Pragmatics of the technology and participants' experiences in the virtual format were assessed through surveys and open-ended questions. RESULTS: Participants were 29.7 (SD 6.9) years old on average, 61.8% (110/178) female, and 59.6% (106/178) White and had an average BMI of 33.1 (SD 3.9) kg/m2. Participants were highly motivated to participate and confident in their ability to complete a weight management program. A total of 82.6% (147/178) of all participants attended 5 of the 8 sessions, and participation was rated as "excellent" by interventionists in both formats. The interventions were found to be credible and to have adequate expectations for effectiveness and high satisfaction in both formats. There were no differences between in-person and virtual participants in any of these metrics, other than interventionist-rated participation, for which virtual participants had significantly higher ratings (P<.001). Technical satisfaction with the virtual sessions was rated as "good" to "very good," and participants were satisfied with the content of the virtual sessions. A word cloud of responses identified "mindfulness," "helpful," "different," "food," "binder," and "class" as concepts the virtual participants found most useful about the program. CONCLUSIONS: Modifications made in response to the COVID-19 pandemic were successful, given the recruitment of active-duty personnel with similar demographic characteristics, attendance levels, and indicators of credibility, expectancy, and satisfaction in the virtual format and the in-person format. This successful transition provides support for the use of virtual or digital weight management interventions to increase accessibility and reach among highly mobile active-duty personnel. TRIAL REGISTRATION: ClinicalTrials.gov NCT03029507; https://clinicaltrials.gov/ct2/show/NCT03029507.


Assuntos
Terapia de Aceitação e Compromisso , COVID-19 , Humanos , Feminino , Criança , Pandemias , Obesidade/terapia , Exercício Físico
16.
Sensors (Basel) ; 23(1)2022 Dec 26.
Artigo em Inglês | MEDLINE | ID: mdl-36616853

RESUMO

This article is a graphical, analytical survey of the literature, over the period 2010-2020, on the measurement of power consumption and relevant power models of virtual entities as they apply to the telco cloud. We present a novel review method, that summarizes the dynamics as well as the results of the research. Our method lends insight into trends, research gaps, fallacies and pitfalls. Notably, we identify limitations of the widely used linear models and the progression towards Artificial Intelligence/Machine Learning techniques as a means of dealing with the seven major dimensions of variability: workload type; computer virtualization agents; system architecture and resources; concurrent, co-hosted virtualized entities; approaches towards the attribution of power consumption to virtual entities; frequency; and temperature.


Assuntos
Inteligência Artificial , Aprendizado de Máquina , Carga de Trabalho
17.
Sensors (Basel) ; 22(19)2022 Oct 07.
Artigo em Inglês | MEDLINE | ID: mdl-36236701

RESUMO

Network Function Virtualization (NFV) offers an alternate method to design, deploy and manage network services. The NFV decouples network functions from the dedicated hardware and moves them to the virtual servers so that they can run in the software. One of the major strengths of the NFV is its ability to dynamically extend or reduce resources allocated to Virtual Network Functions (VNF) as needed and at run-time. There is a need for a comprehensive metering component in the cloud to store and process the metrics/samples for efficient auto-scaling or load-management of the VNF. In this paper, we propose an integrating framework for efficient auto-scaling of VNF using Gnocchi; a time-series database that is integrated within the framework to store, handle and index the time-series data. The objective of this study is to validate the efficacy of employing Gnocchi for auto-scaling of VNF, in terms of aggregated data points, database size, data recovery speed, and memory consumption. The employed methodology is to perform a detailed empirical analysis of the proposed framework by deploying a fully functional cloud to implement NFV architecture using several OpenStack components including Gnocchi. Our results show a significant improvement over the legacy Ceilometer configuration in terms of lower metering storage size, less memory utilization in processing and management of metrics, and reduced time delay in retrieving the monitoring data to evaluate alarms for the auto-scaling of VNF.


Assuntos
Computadores , Software
18.
Sensors (Basel) ; 22(23)2022 Dec 06.
Artigo em Inglês | MEDLINE | ID: mdl-36502246

RESUMO

Federated clouds are interconnected cooperative cloud infrastructures offering vast hosting capabilities, smooth workload migration and enhanced reliability. However, recent devastating attacks on such clouds have shown that such features come with serious security challenges. The oblivious heterogeneous construction, management, and policies employed in federated clouds open the door for attackers to induce conflicts to facilitate pervasive coordinated attacks. In this paper, we present a novel proactive defense that aims to increase attacker uncertainty and complicate target tracking, a critical step for successful coordinated attacks. The presented systemic approach acts as a VM management platform with an intrinsic multidimensional hierarchical attack representation model (HARM) guiding a dynamic, self and situation-aware VM live-migration for moving-target defense (MtD). The proposed system managed to achieve the proposed goals in a resource-, energy-, and cost-efficient manner.


Assuntos
Reprodutibilidade dos Testes
19.
Sensors (Basel) ; 22(3)2022 Jan 18.
Artigo em Inglês | MEDLINE | ID: mdl-35161456

RESUMO

Decoupled data and control planes in Software Defined Networks (SDN) allow them to handle an increasing number of threats by limiting harmful network links at the switching stage. As storage, high-end servers, and network devices, Network Function Virtualization (NFV) is designed to replace purpose-built network elements with VNFs (Virtualized Network Functions). A Software Defined Network Function Virtualization (SDNFV) network is designed in this paper to boost network performance. Stateful firewall services are deployed as VNFs in the SDN network in this article to offer security and boost network scalability. The SDN controller's role is to develop a set of guidelines and rules to avoid hazardous network connectivity. Intruder assaults that employ numerous socket addresses cannot be adequately protected by these strategies. Machine learning algorithms are trained using traditional network threat intelligence data to identify potentially malicious linkages and probable attack targets. Based on conventional network data (DT), Bayesian Network (BayesNet), Naive-Bayes, C4.5, and Decision Table (DT) algorithms are used to predict the target host that will be attacked. The experimental results shows that the Bayesian Network algorithm achieved an average prediction accuracy of 92.87%, Native-Bayes Algorithm achieved an average prediction accuracy of 87.81%, C4.5 Algorithm achieved an average prediction accuracy of 84.92%, and the Decision Tree algorithm achieved an average prediction accuracy of 83.18%. There were 451 k login attempts from 178 different countries, with over 70 k source IP addresses and 40 k source port addresses recorded in a large dataset from nine honeypot servers.

20.
Sensors (Basel) ; 22(10)2022 May 14.
Artigo em Inglês | MEDLINE | ID: mdl-35632161

RESUMO

Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen. ETSI standards precisely define many security aspects of this architecture, but these publications are very long and provide many details which are not of interest to software architects. We start by conducting threat analysis of some of the NFV use cases. The use cases serve as scenarios where the threats to the architecture can be enumerated. Representing threats as misuse cases that describe the modus operandi of attackers, we can find countermeasures to them in the form of security patterns, and we can build a security reference architecture (SRA). Until now, only imprecise models of NFV architectures existed; by making them more detailed and precise it is possible to handle not only security but also safety and reliability, although we do not explore those aspects. Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamental to produce secure networks and allow us to build networks which are secure by design. The resulting SRA defines a roadmap to implement secure concrete architectures.


Assuntos
Computadores , Software , Reprodutibilidade dos Testes
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA